[00:00:03] Speaker 02: The United States Court of Appeals for the Federal Circuit is now open and in session. [00:00:08] Speaker 02: God save the United States and this honorable court. [00:00:13] Speaker 00: The first case for argument this morning is 20-1543, Personal Web Technologies versus Google. [00:00:20] Speaker 00: Mr. Hadley, whenever you're ready. [00:00:24] Speaker 02: Thank you, Your Honor. [00:00:24] Speaker 02: May it please the court. [00:00:26] Speaker 02: In our step one, courts look at the focus of the claims, not whether the invention can be distilled into a single sentence abstract idea. [00:00:36] Speaker 02: The claims are eligible when they do two things under this court's precedence. [00:00:41] Speaker 02: First, they have to focus on a specific asserted improvement in computer or network platform capabilities or functionality. [00:00:50] Speaker 02: and not instead on a process or system that qualifies as an abstract idea for which computers are simply invoked merely as a tool. [00:01:02] Speaker 02: Second, they need to recite a specific means or method that solves a problem in an existing technological process. [00:01:10] Speaker 02: That does not mean that the claims have to recite how a technological solution is captured in the patent claims. [00:01:19] Speaker 04: Go ahead, Judge Laurie, please. [00:01:21] Speaker 04: Thank you, Chief. [00:01:23] Speaker 04: Mr. Hadley, boil down to their essence. [00:01:28] Speaker 04: When you look at the claims, they recite receiving, storing, deleting, and controlling access to data. [00:01:36] Speaker 04: Those are all abstract ideas. [00:01:41] Speaker 02: I don't. [00:01:43] Speaker 02: I don't think we dispute that you can take these claim elements and break them down into individual abstract ideas. [00:01:51] Speaker 02: But in Diamond v. Deere, the Supreme Court said that's not the analysis. [00:01:56] Speaker 02: The analysis looks at the claims at a whole. [00:01:59] Speaker 02: And in fact, the claims here build on one another. [00:02:01] Speaker 02: So the first step is calculating the unique identifier for each data in a data item. [00:02:10] Speaker 02: And then the next elements talk about comparing a request for a particular data item against all the other data items in the data system. [00:02:21] Speaker 02: And that was the particular element that this court focused on in its prior personal web decision in finding that the claims at issue were novel over the prior art asserted. [00:02:34] Speaker 02: And then the third step. [00:02:36] Speaker 04: The issue, as you said, was novelty or obviousness [00:02:40] Speaker 04: And those are different issues. [00:02:42] Speaker 04: We have eligible subject matter here, not a question of novelty or cleverness or non-obviousness. [00:02:51] Speaker 02: That's true. [00:02:52] Speaker 02: And in the prior opinion, this court actually explained the problems that arise in conventional data processing system when using, quote, traditional naming conventions. [00:03:05] Speaker 02: and then describe the claim apparatus for resolving that problem using the content-based identifiers to determine whether a particular data item is present on the system and for various purposes, including to identify... [00:03:20] Speaker 00: I'm a little confused. [00:03:22] Speaker 00: There are three steps recited, and if we were to conclude that with respect to at least each individual step, we've got cases that really are on point that establish that each individual step is an abstract idea. [00:03:39] Speaker 00: So if you take that as a given, just as a hypothetical, do you have an argument that this ordered combination somehow makes the combination of three abstract idea steps non-abstract? [00:03:55] Speaker 00: And do you have an argument about that with respect to these particular steps? [00:04:00] Speaker 02: I do. [00:04:00] Speaker 02: The question, again, goes to whether this ordered combination [00:04:05] Speaker 02: improves computer network platform functionality, or it's simply an abstract idea and invokes the computers as a tool. [00:04:14] Speaker 02: And in this case, they do improve computer functionality. [00:04:18] Speaker 02: As this court recognized, the prior systems [00:04:20] Speaker 02: without using conventional names and file management systems, had a problem with data having the same name, having different data file management systems, and as networks grew larger and larger, this created a huge problem in locating, accessing, and managing data. [00:04:43] Speaker 02: And with this invention essentially completely revamping the naming system and storage location systems, [00:04:50] Speaker 02: for computer networks provided a functional improvement that allowed things like the Internet to flourish. [00:04:59] Speaker 05: Well, let me... Council, this is... Go ahead, Judge Raines. [00:05:03] Speaker 05: Go ahead. [00:05:06] Speaker 05: Council, let me ask you this question. [00:05:08] Speaker 05: In content extraction and transmission versus Wells Fargo, we held that the claims were ineligible, and we kind of laid it out in a simple, [00:05:20] Speaker 05: And we said, number one, they collect data. [00:05:24] Speaker 05: Number two, they recognize certain data within the collected data set. [00:05:29] Speaker 05: And number three, they store that recognized data in the memory. [00:05:33] Speaker 05: When I superimpose those three conclusions in that particular case, what we have here, it's almost identical. [00:05:42] Speaker 05: I'm having a hard time seeing how you're going to get out of this. [00:05:47] Speaker 02: Well, the key difference in those cases, in content extraction in particular, was that there was no functional improvement to the computer network. [00:05:58] Speaker 02: It simply took what was a pre-existing conventional process and applied a computer to it with those known functions. [00:06:10] Speaker 05: In this case, you're not arguing that you have a specialized computer or that the application and the steps result in a specialized computer, correct? [00:06:19] Speaker 02: No, we are not. [00:06:20] Speaker 02: What we're arguing is that there is a documented and fundamental improvement to the network platform itself by substituting the use of content-based identifiers for subjective names and locations in a data processing system. [00:06:38] Speaker 02: That improves the network [00:06:41] Speaker 02: itself. [00:06:42] Speaker 02: And it's very similar to what this court held in packet intelligence versus net scout systems not too long ago. [00:06:51] Speaker 02: In fact, those types of claims had very much the same sort of determining and accessing that this particular patent has. [00:07:02] Speaker 05: But this court found those claims... Is this argument... Are you arguing that the claims are directed towards the improvement [00:07:10] Speaker 05: internet technology. [00:07:13] Speaker 02: Yes, we are arguing that. [00:07:16] Speaker 02: And very much like for the packet intelligence where the claims were eligible because they met a challenge unique to computer networks by identifying disjointed connection flows in a network environment. [00:07:28] Speaker 00: Well, Mr. Hadley, this is Judge Prost. [00:07:31] Speaker 00: I mean, the concern or the question I'm having with your response to Judge Rayna is firstly, and I think Google points this out in its brief, that the alleged [00:07:41] Speaker 00: the improvement is not recited in the claim. [00:07:46] Speaker 00: So putting that aside, we've got a case called Secure Meal and they talk about improving the efficiency of performing an abstract idea by using technological tools does not constitute a technological improvement. [00:08:03] Speaker 00: Are you familiar with that? [00:08:04] Speaker 00: That was in our opinion in Secured Meal. [00:08:07] Speaker 00: I am, Your Honor. [00:08:09] Speaker 00: So those are the two rebuttal points to what you've been telling us. [00:08:12] Speaker 00: So why am I wrong? [00:08:14] Speaker 02: Because in secured mail there was no improvement to the mail system itself. [00:08:18] Speaker 02: It was simply computerizing the mail system by fixing a barcode on letters and packages and then connecting that to a computer in a conventional way. [00:08:30] Speaker 02: Here you're not taking computers and using them in a conventional way. [00:08:35] Speaker 02: You invented or the inventors here came up with an entirely new naming and storage convention [00:08:42] Speaker 02: that avoided the problems that were inherent in prior art conventional systems, where you had diverse networks, diverse file management systems, and subjective names and particular data items could be given the same names. [00:08:57] Speaker 02: And it had very real practical consequences. [00:09:01] Speaker 02: In fact, it invented a whole field called content addressable storage. [00:09:05] Speaker 02: And the real and tangible result of this is that, for example, [00:09:10] Speaker 05: Council, but your claims are not directed towards resolving this diversity of files or the diversity of the file management systems that existed in the Internet. [00:09:25] Speaker 05: So it seems to me, since the claims are not directed to that, then it seems to me that your argument is that this is the claimed advance. [00:09:33] Speaker 05: Is that right? [00:09:34] Speaker 02: It is a claim advance, although I would disagree that the claims are not directed on it. [00:09:39] Speaker 02: Again, we look at the focus of the claims, and the claims don't need to recite how the solution is captured, but instead the specific means or methods. [00:09:49] Speaker 02: And here, if you look at the claims and the order combination, it does say exactly how you do it by giving all of the data items in the network, regardless of size, [00:09:59] Speaker 02: a content-based name, and then comparing against the plurality, comparing one content-based name against all of the others in the network, and then expressly use... It seems to me that if you go down that route, what you're claiming is all data management in the Internet, and that is horrendously broad. [00:10:23] Speaker 02: Well, it really isn't because and that is not what we're claiming data management. [00:10:28] Speaker 02: What we're claiming is the use of content based identifiers compared against the plurality of other identifiers in the entire network. [00:10:37] Speaker 02: to perform very, using the results to perform the operations. [00:10:42] Speaker 02: And all you have to do is look at Woodhill, the prior art that this patent builds on top of and see that there are other ways to do it. [00:10:51] Speaker 02: For example, in Woodhill, you knew the name of the, or you found the file conventionally with its name and you knew its location. [00:11:00] Speaker 02: And then what you could do was not back up a particular piece of that file that you had on your computer if it was already on another computer. [00:11:11] Speaker 02: And what this invention does is it expands that technology considerably so that you don't have to, for example, back up a piece of data, not just if it is in the exact same location in the exact same file that you previously backed up, but whether it is anywhere in the entire network, anywhere. [00:11:31] Speaker 02: And that's a significant improvement. [00:11:37] Speaker 02: I'm into my rebuttal time. [00:11:40] Speaker 00: Yes. [00:11:40] Speaker 00: Why don't we hear from Ms. [00:11:41] Speaker 00: Freeland and we'll reserve your rebuttal time. [00:11:44] Speaker 00: Thank you. [00:11:49] Speaker 00: Ms. [00:11:49] Speaker 00: Freeland? [00:11:50] Speaker 01: Good morning. [00:11:50] Speaker 00: Good morning. [00:11:51] Speaker 01: Yes. [00:11:52] Speaker 01: May it please the court, my name is Cindy Freeland and I'll be arguing this morning on behalf of my clients, ENC and VMware and our co-appellees, Google and Facebook. [00:12:01] Speaker 01: We believe the district court correctly held that the idea of using content-based identifiers to manage data in a computer system is abstract, and that implementing that idea with a generic hash function provides no inventive concept. [00:12:16] Speaker 01: Your Honor has highlighted a number of the cases that are very similar from this court, including content extraction and secured mail. [00:12:24] Speaker 01: I'd also highlight the Intellectual Ventures versus Symantec case, [00:12:28] Speaker 01: and the Smart Systems versus Chicago Transit case, as well as Bridge and Post. [00:12:34] Speaker 01: All of these cases involved generating an identifier based on a hash function or some other mathematical algorithm, comparing that identifier to other values, using the result of that comparison to either deny access to a resource or to delete unwanted content. [00:12:53] Speaker 01: Again, exactly the same three-step process as personal webs claims here and ineligible for the very same reason. [00:13:02] Speaker 01: I'd like to turn first to the issues raised with respect to ALIS Step 1. [00:13:10] Speaker 01: To begin with, there's no dispute here on what the claimed advance is because the district court accepted personal webs characterization of the claim. [00:13:19] Speaker 01: As Your Honor is recognizing your question, [00:13:22] Speaker 01: The claimed advance was simply using a content-based identifier to perform a standard file management function. [00:13:29] Speaker 01: And the court has long held in a long line of cases that claims like these are abstract. [00:13:36] Speaker 00: Well, what about your friend's argument, as I understand it, that there are efficiency gains for the networks in the uses they've claimed in this patent? [00:13:47] Speaker 00: Why doesn't that give them something beyond what our cases have held? [00:13:52] Speaker 01: I think that the challenge their argument is they have to show that there is an improvement to the functionality of computers, and they haven't done that. [00:14:01] Speaker 01: Instead, if anything, these claims just improve the abstract process. [00:14:07] Speaker 05: They're not arguing that they have or they achieve a specialized computer. [00:14:12] Speaker 05: What they're arguing is that they resolved an internet-based problem. [00:14:16] Speaker 05: And that problem was a diversity in the information that existed, the data that existed in the [00:14:22] Speaker 05: in the internet, and it resolved that diversity. [00:14:29] Speaker 01: Right. [00:14:29] Speaker 01: And I would say consistent with the cases, that is an improvement to the abstract process and not to the functionality of the computers. [00:14:37] Speaker 05: And I would highlight... But our cases do recognize that you can have claims that are directed to an improvement in the technology of the internet, and that that could be patent eligible. [00:14:53] Speaker 01: Absolutely, if you are improving the functionality of the computer or the network and not simply improving the abstract process. [00:15:02] Speaker 01: And I would highlight that in three of the cases cited in our brief, the three we focused on, ID versus Symantec, Smart Systems versus Chicago, Bridge and Post, all three of these involved very, very similar claims to improving the functionality of a computer and a network. [00:15:20] Speaker 01: All three of these cases [00:15:21] Speaker 01: You know, Mr. Hadley has focused on the use of hash-based identifiers. [00:15:26] Speaker 01: In all three of these cases, the court addressed the claim that used a hash-based identifier for the same purported efficiencies. [00:15:35] Speaker 01: In the smart system case, there was a hash identifier for bank cards that purportedly led to the same system improvement. [00:15:44] Speaker 01: In Bridge and Post, a persistence identifier for a device that was a hash. [00:15:49] Speaker 01: that was used to implement targeted marketing and ID versus man-tagging. [00:15:56] Speaker 05: Can you address your opponent's claim, as I see it, that what they have improved is network functionality. [00:16:05] Speaker 05: And if you have a diverse means in which data is managed, is located, is identified, and you have many parties that are applying their own [00:16:18] Speaker 05: way of doing this, they claim that they resolved that diversity of data management and that that improved network functionality. [00:16:28] Speaker 05: That seems to get a little bit close to the edge of being paneligible. [00:16:35] Speaker 01: Well, I would say those are exactly the arguments that this court rejected in IV versus Symantec and Smart Systems versus Chicago Transit and in Bridge and Post. [00:16:44] Speaker 01: Because as the court concluded in all those cases, the claimed improvement wasn't to the functionality of the computer. [00:16:52] Speaker 01: It wasn't a specific implementation. [00:16:54] Speaker 05: I'm not talking about improving the functionality of a computer. [00:16:59] Speaker 05: They've already said that that's not what the claims are directed to. [00:17:03] Speaker 05: They're saying that the claims are directed to improvement network functionality. [00:17:09] Speaker 01: And I think what they're essentially saying, though, is that it's an improvement in the abstract process. [00:17:14] Speaker 01: They're saying that these hash-based identifiers improve the process of managing data. [00:17:21] Speaker 01: And as this court has held many times, merely adding computer functionality to increase the speed or efficiency of a process is not enough for patent eligibility. [00:17:32] Speaker 01: And I think that's all that's happening here. [00:17:35] Speaker 01: adding computer functionality to or using computer functionality to try and more efficiently perform this abstract process of locating data in a network and of accessing, controlling access to data in a network. [00:17:55] Speaker 01: And I think the library analogy that we've highlighted in our brief underscores this. [00:18:01] Speaker 01: You know, librarians have been using content-based identifiers to identify, locate, and manage library books for decades. [00:18:09] Speaker 01: And these claims aren't, you know, all the claims are doing is adding computer functionality to try and increase the speed and efficiency of what is otherwise an abstract process. [00:18:22] Speaker 05: And also... Is this invention the Dewey Decimal System for Internet [00:18:30] Speaker 05: network functionality? [00:18:33] Speaker 01: I think it is akin to a three-decimal system for a network. [00:18:37] Speaker 01: I mean, it's using content-based identifiers to identify, locate, and manage content. [00:18:45] Speaker 01: These hash-based identifiers, the patent claims, makes it easier to see where things are located, to find things in a network, to manage number of copies. [00:18:56] Speaker 01: So absolutely we see it as no different than a computerized implementation of the abstract idea. [00:19:04] Speaker 05: So let's say you have five libraries and the librarian in each one of those libraries applies a different classification system for identifying and locating material in the library. [00:19:15] Speaker 05: Then somebody comes along and creates a system that clears the diversity found in the five different systems and comes up with one system. [00:19:26] Speaker 05: to where you can go to one library to the next and find and identify the materials using one system. [00:19:33] Speaker 05: Isn't that an improvement of network functionality, of internet network functionality? [00:19:42] Speaker 01: Well, I would say, I mean, that is exactly the Dewey Decimal System. [00:19:45] Speaker 01: I mean, the Dewey Decimal System is a single, the idea was to have the same organization process, the same, [00:19:54] Speaker 01: naming process across libraries and across books. [00:19:58] Speaker 01: So it is, you know, certainly a Dewey Decimal System improved the libraries, but it's an improvement to the abstract process of identifying and locating and managing books. [00:20:09] Speaker 01: And, you know, here the content-based identifiers perform the same function. [00:20:16] Speaker 01: And again, I'd highlight that, you know, that efficiency gain from these content-based identifiers that personal web focuses on [00:20:23] Speaker 01: Those were exactly the same arguments that were made in the Symantec case, in the Smart System case, in the Bridge and Post case. [00:20:30] Speaker 01: In each of those cases, the patent owners focused on the use of a mathematically based or hash based identifier to make more efficient the process of managing data. [00:20:42] Speaker 01: And in every one of those cases, the court found that to the extent there was any improvement, it was an improvement to the abstract process and not an improvement to network or computer functionality. [00:21:00] Speaker 01: And I'd also highlight, so we see no improvement here, no technical improvement. [00:21:08] Speaker 01: And as Judge Prost and Judge Laurie both recognized, [00:21:11] Speaker 01: In addition to that problem, the purported improvements that personal web is focused on are just nowhere captured in a patent claim. [00:21:22] Speaker 01: And I think you can see that, for example, by looking at claim 24 of the 310 patent, which appears on the appendix 379. [00:21:32] Speaker 01: This is the claim that the parties focused on quite a bit in their brief. [00:21:37] Speaker 01: And if you were to look at this claim, [00:21:39] Speaker 01: You know, none of the cited, all improvements that personal web claims are in this claim. [00:21:47] Speaker 00: Instead, there's... Well, let me ask you about that, because on that argument, are you saying that they need, the claims need to recite the words, this improves network functionality, or is it sufficient that the operations that are stated in the claims will simply have that effect? [00:22:06] Speaker 01: I think the latter, Your Honor. [00:22:07] Speaker 01: The question is whether implementing this claim would achieve the purported improvement. [00:22:14] Speaker 00: And if you were to look at the... Doesn't the... Excuse me a minute. [00:22:17] Speaker 00: Doesn't the specification discuss improvements that are premised on those claim steps? [00:22:24] Speaker 01: Well, no. [00:22:26] Speaker 01: I mean, the... If you were to look at the particular claims, I mean, the question is, [00:22:32] Speaker 01: Is the structure in this claim accomplishing the goals that the specification set out? [00:22:38] Speaker 01: And I would say no. [00:22:39] Speaker 01: I mean, if you were to look at claim 24, for example, claim 24, the first limitation, limitation A, is simply a whole lot of words for the idea of using one of these content-dependent names that's based on a hash function. [00:22:54] Speaker 01: And then if you were to go to limitation B, [00:22:58] Speaker 01: All it says is... Ms. [00:23:01] Speaker 04: Vreeland, isn't it also your view that if these added points were in the claims, they would still be abstractions? [00:23:09] Speaker 01: Yes, absolutely. [00:23:12] Speaker 01: Even if these supported improvements were in the claim, they would absolutely still be abstractions. [00:23:18] Speaker 01: The claims would do no more than improve the abstract process. [00:23:21] Speaker 01: But in addition to that, the claimed improvements they focus on just aren't in the claim. [00:23:28] Speaker 01: In this claim, you're simply comparing one of these content dependent names to a plurality of values to decide if access should be provided or not provided. [00:23:40] Speaker 01: And if you look at the specification where it talks about the embodiment of this claim, which is in column 31, you're not even comparing these content dependent names to all of the other content in the network. [00:23:54] Speaker 01: You're just comparing them to a licensing table. [00:23:57] Speaker 01: So this is, you know, the only structure that this claim provides is taking a content-dependent name and comparing it to two other values in a table of licensed content and using that table of licensed content to decide whether access should be authorized or not. [00:24:19] Speaker 01: So purely abstract and also doesn't capture any of the reported improvements. [00:24:26] Speaker 01: It's column 31 of the patent at the top of column 31 that talks about this licensing table. [00:24:36] Speaker 01: So Ada, I guess with my remaining time I would turn quickly to the second step of the process unless there are any other questions on ALICE step one. [00:24:49] Speaker 01: And I would just highlight for ALICE step two, [00:24:53] Speaker 01: that personal web focuses, again, on this use of content-based identifiers, but significantly, they don't claim that the mathematical algorithms used to create the content-based identifiers provide the inventive concepts, and they can't, because the patents admit... I'm sorry, what's our... [00:25:15] Speaker 01: Because the patents admit that these hash-based, these hash functions used to create the identifiers were old, well-known, and conventional. [00:25:24] Speaker 01: Instead, personal web focuses on the use of these content-based identifiers. [00:25:29] Speaker 01: It claims that this new use of an old technology provides the inventive concept. [00:25:35] Speaker 01: And I would just highlight that that isn't enough to save the claims. [00:25:39] Speaker 01: even if you were to consider the combination, even if you were to consider all of the elements in those claims together, they still amount to nothing more than applying the abstract idea on generic computer components with a known mathematical algorithm. [00:25:55] Speaker 01: And here, they can't claim that the fact that the claims reference this content-based identifier based on a hash function [00:26:06] Speaker 01: isn't enough to take them out of the abstract. [00:26:09] Speaker 01: The court has been clear that you can't patent a mathematical algorithm, and the patents admit that the algorithms here are old. [00:26:19] Speaker 01: So the claims do nothing more than apply the abstract idea using conventional and well-understood technologies. [00:26:27] Speaker 01: In the BSG case, this court emphasized that if a claim's only inventive concept is the application of an abstract idea, [00:26:36] Speaker 01: using conventional and well-understood techniques, then the claim has not been transformed. [00:26:42] Speaker 01: So we believe the district court correctly held that there were no inventive concepts, either individually or in combination. [00:26:49] Speaker 01: Instead, the claim simply used the abstract ideas in a conventional way, again, just like the claim that this court found not patentable, and content extraction, and ID versus demand tax, and smart systems, and a bridging post. [00:27:04] Speaker 00: Thank you. [00:27:05] Speaker 00: Thank you. [00:27:07] Speaker 00: Mr. Hadley, you've got your rebuttal time remaining. [00:27:10] Speaker 02: Thank you, Your Honor. [00:27:16] Speaker 02: the improvement to network functionality is almost the same as what we saw in, first, the packet intelligence case. [00:27:24] Speaker 02: The invention is not the hash value itself, but many, many inventions that improve network functionality make use of identifiers, and that's true in packet intelligence, where they created an identifier called a flow signature, analyze that flow signature against other flow signatures in a table, [00:27:43] Speaker 02: and then used the results to perform certain operations and that was found to be patent eligible because it improved a network functionality. [00:27:54] Speaker 02: The same was true in the S-Tech versus Adobe case. [00:27:57] Speaker 02: where a key manager, a form of an identifier was used to quote in the claim language, determine access authorization based on an object label. [00:28:10] Speaker 02: And that was used to improve network security, again an improved functionality of the network itself. [00:28:18] Speaker 02: just like the claims at issue here. [00:28:21] Speaker 02: In contrast, cases like smart systems didn't improve network functionality. [00:28:26] Speaker 02: It simply used a bank card to gain access to mass transit. [00:28:30] Speaker 02: Nothing improved network functionality. [00:28:32] Speaker 02: Same was true in Bridge and Post, where the identifier was used [00:28:37] Speaker 02: to track users and deliver targeted media such as advertisements. [00:28:42] Speaker 02: Again, no improvement in computer functionality or network functionality. [00:28:47] Speaker 02: And in the IV case, the same was true, where the identifier was used in connection with virus scanning, but there was no improved functionality of the network or even the virus scanner. [00:29:03] Speaker 02: It was simply conventional virus scanning. [00:29:06] Speaker 02: And I think the library analogy that Ms. [00:29:10] Speaker 02: Villeland raised is particularly useful here because it's undisputed that these patents don't simply computerize the duly decimal system. [00:29:19] Speaker 02: The invention here would be akin [00:29:22] Speaker 02: to taking every book in every library and randomly organizing them, shuffling them, not putting them with subject matter or even in numerical order, and then giving a librarian a random number and saying, don't authorize that book. [00:29:39] Speaker 02: or eliminate all duplicates or locate it based on just this number. [00:29:45] Speaker 02: And by the way, if there is a single word in the book that differs, then don't do any of these operations. [00:29:53] Speaker 02: That's the kind of improvement to the network functionality that is comparable to the library system. [00:30:00] Speaker 05: Why isn't this just an application of an algorithm [00:30:04] Speaker 05: a well-known algorithm at that to a non-generic computer and saying apply it. [00:30:13] Speaker 02: Because it changed the way that files are located and distributed across computer networks in a functionally improved way. [00:30:25] Speaker 02: It is a way that was hindering the development of the Internet when you had these diverse networks with different file management systems, different naming locations, and conventional names. [00:30:40] Speaker 02: There was a limit to how expansive the Internet could be [00:30:45] Speaker 02: with the conventional process. [00:30:49] Speaker 02: And what using the hash identifier here did was allow for that expansion that couldn't have happened otherwise. [00:30:59] Speaker 02: And that's exactly the kind of invention and network improvement that had been recognized in this court's cases such as Packet Intelligence and TechSec. [00:31:16] Speaker 00: Thank you, Mr. Hadley. [00:31:17] Speaker 00: I think we heard the buzzers. [00:31:19] Speaker 00: Thank you. [00:31:19] Speaker 00: Thank both sides and the case is submitted. [00:31:24] Speaker 02: Thank you.